Analysis
-
max time kernel
191s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 12:55
Behavioral task
behavioral1
Sample
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe
Resource
win10v2004-20221111-en
General
-
Target
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe
-
Size
324KB
-
MD5
4f70734b087b989d43f00b4b898fa0b4
-
SHA1
85a7f29d933df315834adf9c1ed97a9e834c34c6
-
SHA256
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81
-
SHA512
133acebf6ec4e003655bf2115a553824fdc5b4ab4acc35d1fb8f200d02dc0f7840c9b47eaaab8bc56308d5408fc3659de4726ec855e8b4e9527f67001fa1c3ef
-
SSDEEP
6144:d/j5C+E13/4YIJ8m1MxUyRzoVOBlYQflIGE:d/s+mP4BJTM6++OBlYERE
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000300000002265a-134.dat aspack_v212_v242 behavioral2/files/0x000300000002265a-135.dat aspack_v212_v242 behavioral2/files/0x0008000000023194-139.dat aspack_v212_v242 behavioral2/files/0x0008000000023194-140.dat aspack_v212_v242 behavioral2/files/0x00060000000231ad-147.dat aspack_v212_v242 behavioral2/files/0x00060000000231ad-148.dat aspack_v212_v242 behavioral2/files/0x0006000000022653-151.dat aspack_v212_v242 behavioral2/files/0x0008000000023197-153.dat aspack_v212_v242 behavioral2/files/0x0006000000022653-154.dat aspack_v212_v242 behavioral2/files/0x000a0000000231a6-158.dat aspack_v212_v242 behavioral2/files/0x0008000000023197-159.dat aspack_v212_v242 behavioral2/files/0x000a0000000231ab-163.dat aspack_v212_v242 behavioral2/files/0x000a0000000231a6-165.dat aspack_v212_v242 behavioral2/files/0x000a0000000231ab-164.dat aspack_v212_v242 behavioral2/files/0x00070000000231ae-172.dat aspack_v212_v242 behavioral2/files/0x00070000000231ae-173.dat aspack_v212_v242 behavioral2/files/0x00060000000231c9-177.dat aspack_v212_v242 behavioral2/files/0x00060000000231c9-178.dat aspack_v212_v242 behavioral2/files/0x00060000000231ce-182.dat aspack_v212_v242 behavioral2/files/0x00060000000231cf-183.dat aspack_v212_v242 behavioral2/files/0x00060000000231ce-185.dat aspack_v212_v242 behavioral2/files/0x00060000000231cf-184.dat aspack_v212_v242 behavioral2/files/0x00060000000231d1-192.dat aspack_v212_v242 behavioral2/files/0x00060000000231d1-191.dat aspack_v212_v242 behavioral2/files/0x00060000000231e9-199.dat aspack_v212_v242 behavioral2/files/0x00060000000231e9-200.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3556 30863c9f.exe -
Sets DLL path for service in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 30863c9f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 30863c9f.exe -
resource yara_rule behavioral2/memory/2712-132-0x0000000020000000-0x0000000020053000-memory.dmp upx behavioral2/files/0x000300000002265a-134.dat upx behavioral2/files/0x000300000002265a-135.dat upx behavioral2/memory/3556-136-0x00000000001B0000-0x00000000001FE000-memory.dmp upx behavioral2/memory/3556-137-0x00000000001B0000-0x00000000001FE000-memory.dmp upx behavioral2/memory/3556-138-0x00000000001B0000-0x00000000001FE000-memory.dmp upx behavioral2/files/0x0008000000023194-139.dat upx behavioral2/files/0x0008000000023194-140.dat upx behavioral2/memory/1488-141-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/1488-142-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/1488-144-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/2712-145-0x0000000020000000-0x0000000020053000-memory.dmp upx behavioral2/files/0x00060000000231ad-147.dat upx behavioral2/files/0x00060000000231ad-148.dat upx behavioral2/memory/932-149-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/932-150-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/files/0x0006000000022653-151.dat upx behavioral2/memory/932-152-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/files/0x0008000000023197-153.dat upx behavioral2/files/0x0006000000022653-154.dat upx behavioral2/memory/2804-155-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/2804-156-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/2804-157-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/files/0x000a0000000231a6-158.dat upx behavioral2/files/0x0008000000023197-159.dat upx behavioral2/memory/4036-161-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/4036-160-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/4036-162-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/files/0x000a0000000231ab-163.dat upx behavioral2/files/0x000a0000000231a6-165.dat upx behavioral2/files/0x000a0000000231ab-164.dat upx behavioral2/memory/3312-167-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/4248-166-0x00000000756A0000-0x00000000756EE000-memory.dmp upx behavioral2/memory/3312-168-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/4248-169-0x00000000756A0000-0x00000000756EE000-memory.dmp upx behavioral2/memory/3312-170-0x00000000756F0000-0x000000007573E000-memory.dmp upx behavioral2/memory/4248-171-0x00000000756A0000-0x00000000756EE000-memory.dmp upx behavioral2/files/0x00070000000231ae-172.dat upx behavioral2/files/0x00070000000231ae-173.dat upx behavioral2/memory/4460-175-0x00000000755D0000-0x000000007561E000-memory.dmp upx behavioral2/memory/4460-174-0x00000000755D0000-0x000000007561E000-memory.dmp upx behavioral2/memory/4460-176-0x00000000755D0000-0x000000007561E000-memory.dmp upx behavioral2/files/0x00060000000231c9-177.dat upx behavioral2/memory/5068-180-0x00000000750E0000-0x000000007512E000-memory.dmp upx behavioral2/memory/5068-179-0x00000000750E0000-0x000000007512E000-memory.dmp upx behavioral2/files/0x00060000000231c9-178.dat upx behavioral2/memory/5068-181-0x00000000750E0000-0x000000007512E000-memory.dmp upx behavioral2/files/0x00060000000231ce-182.dat upx behavioral2/files/0x00060000000231cf-183.dat upx behavioral2/files/0x00060000000231ce-185.dat upx behavioral2/memory/2424-186-0x0000000074EB0000-0x0000000074EFE000-memory.dmp upx behavioral2/files/0x00060000000231cf-184.dat upx behavioral2/memory/4728-187-0x0000000074E60000-0x0000000074EAE000-memory.dmp upx behavioral2/memory/4728-194-0x0000000074E60000-0x0000000074EAE000-memory.dmp upx behavioral2/memory/672-193-0x00000000743A0000-0x00000000743EE000-memory.dmp upx behavioral2/memory/672-195-0x00000000743A0000-0x00000000743EE000-memory.dmp upx behavioral2/memory/672-197-0x00000000743A0000-0x00000000743EE000-memory.dmp upx behavioral2/memory/2424-196-0x0000000074EB0000-0x0000000074EFE000-memory.dmp upx behavioral2/files/0x00060000000231d1-192.dat upx behavioral2/files/0x00060000000231d1-191.dat upx behavioral2/memory/2712-190-0x0000000020000000-0x0000000020053000-memory.dmp upx behavioral2/memory/4728-189-0x0000000074E60000-0x0000000074EAE000-memory.dmp upx behavioral2/memory/2424-188-0x0000000074EB0000-0x0000000074EFE000-memory.dmp upx behavioral2/memory/3556-198-0x00000000001B0000-0x00000000001FE000-memory.dmp upx -
Loads dropped DLL 12 IoCs
pid Process 1488 svchost.exe 932 svchost.exe 2804 svchost.exe 4036 svchost.exe 3312 svchost.exe 4248 svchost.exe 4460 svchost.exe 5068 svchost.exe 2424 svchost.exe 4728 svchost.exe 672 svchost.exe 3504 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nla.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 30863c9f.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 30863c9f.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600d8ddf1503d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999317" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e6851ef31fd3cf49b332bbb4721c974800000000020000000000106600000001000020000000e28eb16172d2753f9fc2beec59fcc416ca512a0886e0a43de95a5b2e93b616b8000000000e80000000020000200000007d95bf1dbdfec5c30ed277209194ec1ac4f5cfc4d223a69f847eaebcbfd832722000000034c0897b07b7b60f2ccdbc33ef644c3e6043c5e363c6b544f8090889e021fd5b400000001d1ad1bb82811e2683a11ba91f3ab58820c8e2e1b3c047b0c032067b7f2922285a2470a5ea9a4e76dbbdac331498027f8cc17b3d77a959a41c1cfd427a7e4fcd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376396954" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999317" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3259004244" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3259004244" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09f11d11503d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F3DFDD80-6F08-11ED-919F-4EF50EB22100} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999317" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e6851ef31fd3cf49b332bbb4721c97480000000002000000000010660000000100002000000012e1bf0cf586a55ae3d4a855110586c82783d71003923652fd1802cef105d63a000000000e8000000002000020000000d968bf926555b430b34ae4957058eaf7c1dedbf1c6bb37f6aeb3dbcedecccb1820000000ae7cd38b8de57cbf456145410f58a572fbc311ee8fa95f3bc56ecec5d09f998140000000fccfa0a929ad5d019a430a4e97db69ba8339e963ca7ce78644cedc0353c1a702b6a325dbfb8e0be5c3acd8e7421d552f256eb3bf82bfad36f87642154fc118c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3379474086" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3556 30863c9f.exe 3556 30863c9f.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1240 iexplore.exe 1240 iexplore.exe 4348 IEXPLORE.EXE 4348 IEXPLORE.EXE 4348 IEXPLORE.EXE 4348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2712 wrote to memory of 3556 2712 0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe 82 PID 2712 wrote to memory of 3556 2712 0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe 82 PID 2712 wrote to memory of 3556 2712 0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe 82 PID 2712 wrote to memory of 1240 2712 0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe 96 PID 2712 wrote to memory of 1240 2712 0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe 96 PID 1240 wrote to memory of 4348 1240 iexplore.exe 98 PID 1240 wrote to memory of 4348 1240 iexplore.exe 98 PID 1240 wrote to memory of 4348 1240 iexplore.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe"C:\Users\Admin\AppData\Local\Temp\0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\30863c9f.exeC:\30863c9f.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.macromedia.com/shockwave/download/?P1_Prod_Version=SWArchive10.0.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:1488
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:932
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
PID:2804
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
PID:4036
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
PID:4248
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
PID:3312
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
PID:4460
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
PID:5068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
PID:4728
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
PID:2424
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
PID:672
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
PID:3504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5f5d2a6e81cd9b23d4899371b296b8a8c
SHA17b095e73b522c5a1b12e26ae389464c5c123bc8e
SHA256775082343ef68119bf9bf671c677c981b68ed6f627ff5b8b4de414e2e9d29a42
SHA51277842aae633daac864c148fdc5d40b22cc1dc9e3e0c0e81df7694d2c6e95bfb02bc18bb34c047bbf4b12dc24d14eb1b89acf75f43f547e311fe63730b6a54662
-
Filesize
240KB
MD5f5d2a6e81cd9b23d4899371b296b8a8c
SHA17b095e73b522c5a1b12e26ae389464c5c123bc8e
SHA256775082343ef68119bf9bf671c677c981b68ed6f627ff5b8b4de414e2e9d29a42
SHA51277842aae633daac864c148fdc5d40b22cc1dc9e3e0c0e81df7694d2c6e95bfb02bc18bb34c047bbf4b12dc24d14eb1b89acf75f43f547e311fe63730b6a54662
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095
-
Filesize
240KB
MD5e48f830a89ba95daf7650bb9b05bd117
SHA1304e6666ad4a8e0329f7aa4646c34c5fe57d19fe
SHA256046338af97e20aaf13aa5aa3c550a139a5f41ee3f22592497ab1f9b7c82786c6
SHA512a462bea2fedd9135dd9b226b5b20cfd8172581d03b2c06acae4018ba8fba1c1e5f2d68f7e0ff860fd9269a02e36cc6c59e33b8c02f8168cd83e674ee074b3095